Skip to content

Data Protection and Information Lifecycle Management

Best in textbook rentals since 2012!

ISBN-10: 0131927574

ISBN-13: 9780131927575

Edition: 2006

Authors: Tom Petrocelli

List price: $49.99
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
We're sorry. This item is currently unavailable.
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

The author demonstrates how to protect enterprise data, develop protection strategies, & guard storage infrastructure from intrusion.
Customers also bought

Book details

List price: $49.99
Copyright year: 2006
Publisher: Prentice Hall PTR
Publication date: 9/23/2005
Binding: Paperback
Pages: 288
Size: 7.00" wide x 9.25" long x 0.75" tall
Weight: 1.188
Language: English

Acknowledgments
About the Author
Preface
Who Is This Book For?
How This Book Is Arranged
What You Will Take Away from This Book
Introduction to Data Protection
What Does Data Protection Mean?
A Model for Information, Data, and Storage
Why Is Data Protection Important to the Enterprise?
Data Loss and Business Risk
Connectivity: The Risk Multiplier
Business Continuity: The Importance of Data Availability to Business Operations
The Changing Face of Data Protection
Key Points
An Overview of Storage Technology
A Quick History of Data Storage
Storage I/O Basics
The I/O Stack
Direct Attach Storage
Network Attached Storage (NAS).Storage Area Networks
Extending SANs over MAN and WAN.Key Points
Backup and Restore
The First Line of Defense
Designing Storage Systems for Backup and Recovery
Recovering from Disaster: Restoring Data
Things That Go Wrong with Restore Operations
Tape Backup
Disk-to-Disk Backup
Disk-to-Disk to Tape
Backup and Restore Practices
Application-Level Backup and Recovery
Case Study: Bingham McCutchen
Key Points
Remote Copy and Replication: Moving Data to a Safe Location
How Remote Copy and Replication Are Different from Backup
Remote Copy
Design Considerations for Remote Copy
Replication
Case Study: PdMain
Key Points
Basic Security Concepts
Least Privilege
Defense in Depth
Diversity of Defense
Encryption
Typical Attacks
Key Points
Storage System Security
The Role of Storage Security in Enterprise Data Protection
DAS Security
SAN Security
Internal and External Vectors
Risk
Security Practices for Storage
Secure Fibre Channel Protocols: FC-SP and FCAP
Case Study: Transend Services
Key Points
Policy-Based Data Protection
Difficulties with Data Protection Strategies
Data Lifecycle Management (DLM).Key Points
Information Lifecycle Management
Information Assurance and Data Protection
What Is Information Lifecycle Management?
Unstructured and Structured Information
The Importance of Context
Determining and Managing Information Context
Location and the Information Perimeter
The Information Lifecycle
An ILM Schema
Matching Information Value to Protection Options
The Changing Value of Information
Regulatory Concerns
Protecting Information Using ILM Policies
Controlling Information Protection Costs
Automating ILM
Case Study: MidAmerica Bank
Key Points
XML Schemas and Document Type Definitions for Policy Statements
Resources
Books Worth Reading
Organizations and Conferences
Web Sites Worth Visiting
Government Documents and Resources
Acronyms
Glossary
Bibliography
Index